Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 21:18

General

  • Target

    931cdb4b6cd23f7d29ee41e2f1c8a2c93396c7b0705ae7b2bfabf594a5c0a26c.exe

  • Size

    1.1MB

  • MD5

    df3d85790a595d14e2ded74123bf050b

  • SHA1

    eda738b3f7faee11fe6b085ee98b2b1c1a1fc21d

  • SHA256

    931cdb4b6cd23f7d29ee41e2f1c8a2c93396c7b0705ae7b2bfabf594a5c0a26c

  • SHA512

    722abe748e4216680ececc1700bd1f6df79e59279ebdc64a01bb9e6f2bc48ab7316bcbd8719f0b33fa311bbbf4fc0745aeaca9210129febb877296248f932c3a

  • SSDEEP

    24576:SyytC/zPgHGVCck+4BRE25TwdvEZnzMXhGhYBTK7DDKslQmIy:5X9V9k1P9wdvE1MXBeDDKs

Malware Config

Extracted

Family

redline

Botnet

linda

C2

185.161.248.75:4132

Attributes
  • auth_value

    21cdc21d041667b9c1679f88a1146770

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\931cdb4b6cd23f7d29ee41e2f1c8a2c93396c7b0705ae7b2bfabf594a5c0a26c.exe
    "C:\Users\Admin\AppData\Local\Temp\931cdb4b6cd23f7d29ee41e2f1c8a2c93396c7b0705ae7b2bfabf594a5c0a26c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0944794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0944794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1851026.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1851026.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0473119.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0473119.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3914081.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3914081.exe
          4⤵
          • Executes dropped EXE
          PID:3960
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 928
            5⤵
            • Program crash
            PID:4592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:3288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 12
          4⤵
          • Program crash
          PID:5020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3960 -ip 3960
    1⤵
      PID:4676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3288 -ip 3288
      1⤵
        PID:3080

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r8965837.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
        Filesize

        961KB

        MD5

        90bad118270eedd8c421aa6f31025547

        SHA1

        723a32a43093e0d27d080c3590b08c517c306b1d

        SHA256

        434e5c8852d0c8fd4931cc8ab87ab45380096c263d218f09faddd214d3572842

        SHA512

        c0bed615472686abef20806940a3229abbf6d09470d50819b9b2d8f0f9c961b2fb71e92d893d6517dad7ae8c14eb93bf981d71bf52890b08290e1300daff4518

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
        Filesize

        961KB

        MD5

        90bad118270eedd8c421aa6f31025547

        SHA1

        723a32a43093e0d27d080c3590b08c517c306b1d

        SHA256

        434e5c8852d0c8fd4931cc8ab87ab45380096c263d218f09faddd214d3572842

        SHA512

        c0bed615472686abef20806940a3229abbf6d09470d50819b9b2d8f0f9c961b2fb71e92d893d6517dad7ae8c14eb93bf981d71bf52890b08290e1300daff4518

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3394946.exe
        Filesize

        961KB

        MD5

        90bad118270eedd8c421aa6f31025547

        SHA1

        723a32a43093e0d27d080c3590b08c517c306b1d

        SHA256

        434e5c8852d0c8fd4931cc8ab87ab45380096c263d218f09faddd214d3572842

        SHA512

        c0bed615472686abef20806940a3229abbf6d09470d50819b9b2d8f0f9c961b2fb71e92d893d6517dad7ae8c14eb93bf981d71bf52890b08290e1300daff4518

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0944794.exe
        Filesize

        703KB

        MD5

        f3161bd67cb0e049b7e293aa8df8362a

        SHA1

        2ebbe67e488f11d720610b3dc39f0194c0864aa8

        SHA256

        a264d090e9e662ce5df2390f8e7f45e8f7211125382227b91665d026191ce6a5

        SHA512

        3d93f29dc4fae39ab5edd6d378a0eb6d07d645c228f63073cf05d3d0bf151d6960850c9f40682e3fcc99f7fc7d1e8541f7a5c2c417830390ff27703db84b75f4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0944794.exe
        Filesize

        703KB

        MD5

        f3161bd67cb0e049b7e293aa8df8362a

        SHA1

        2ebbe67e488f11d720610b3dc39f0194c0864aa8

        SHA256

        a264d090e9e662ce5df2390f8e7f45e8f7211125382227b91665d026191ce6a5

        SHA512

        3d93f29dc4fae39ab5edd6d378a0eb6d07d645c228f63073cf05d3d0bf151d6960850c9f40682e3fcc99f7fc7d1e8541f7a5c2c417830390ff27703db84b75f4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
        Filesize

        903KB

        MD5

        2c2bd01b00a6f7a9eed28826d56d54e7

        SHA1

        c8c1b956178ae458d22b9ba9eea5f7104622f492

        SHA256

        9aa5f8739faa92eacdc048670f73fe06a42647e62941f6b8ac9b929cb7b7e251

        SHA512

        d198514f3b9e0c7032fcd5b5e71bb4903d568d17d36a5db625326c114c7ab26b15c42c12cdea223dfc7f05f6e8c5a5a0904b7287895528640044cc43b8776d87

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
        Filesize

        903KB

        MD5

        2c2bd01b00a6f7a9eed28826d56d54e7

        SHA1

        c8c1b956178ae458d22b9ba9eea5f7104622f492

        SHA256

        9aa5f8739faa92eacdc048670f73fe06a42647e62941f6b8ac9b929cb7b7e251

        SHA512

        d198514f3b9e0c7032fcd5b5e71bb4903d568d17d36a5db625326c114c7ab26b15c42c12cdea223dfc7f05f6e8c5a5a0904b7287895528640044cc43b8776d87

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8965837.exe
        Filesize

        903KB

        MD5

        2c2bd01b00a6f7a9eed28826d56d54e7

        SHA1

        c8c1b956178ae458d22b9ba9eea5f7104622f492

        SHA256

        9aa5f8739faa92eacdc048670f73fe06a42647e62941f6b8ac9b929cb7b7e251

        SHA512

        d198514f3b9e0c7032fcd5b5e71bb4903d568d17d36a5db625326c114c7ab26b15c42c12cdea223dfc7f05f6e8c5a5a0904b7287895528640044cc43b8776d87

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1851026.exe
        Filesize

        305KB

        MD5

        ed56ac2e9caed29f7db23f234a55a1dc

        SHA1

        14411dd59afab0b1709ac7589bb67203e2dbced9

        SHA256

        91515edf17778879f7c01e741781044f7ea63d2d082074bdd1992a9477a24502

        SHA512

        0dc59222636698104921eabec1d69e99e1b488aeb65a9aef6555882b6828c4c6d7b450ccd2a0fc97f2a3e8b306d4f88acde1a9d4d6c03c50006bb0bd5a20f47f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1851026.exe
        Filesize

        305KB

        MD5

        ed56ac2e9caed29f7db23f234a55a1dc

        SHA1

        14411dd59afab0b1709ac7589bb67203e2dbced9

        SHA256

        91515edf17778879f7c01e741781044f7ea63d2d082074bdd1992a9477a24502

        SHA512

        0dc59222636698104921eabec1d69e99e1b488aeb65a9aef6555882b6828c4c6d7b450ccd2a0fc97f2a3e8b306d4f88acde1a9d4d6c03c50006bb0bd5a20f47f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0473119.exe
        Filesize

        184KB

        MD5

        853f8cc5c519381802203fab27c7dbda

        SHA1

        198f96cc419531dd1ecf640f87fa6e4357f4cb8e

        SHA256

        9286d0b0424a4e8f8413d4ba3cf3c398ba7d4d39dc92ac35651e5528d02cbf16

        SHA512

        61e86bbc3f4c04d0a9afac854ee2ceb724194d86e4f831c7ac651d4688e1ea82790af8adbde776100aff5f2ce0aaeec0b35f69378abe04d28c0495c59fb31585

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0473119.exe
        Filesize

        184KB

        MD5

        853f8cc5c519381802203fab27c7dbda

        SHA1

        198f96cc419531dd1ecf640f87fa6e4357f4cb8e

        SHA256

        9286d0b0424a4e8f8413d4ba3cf3c398ba7d4d39dc92ac35651e5528d02cbf16

        SHA512

        61e86bbc3f4c04d0a9afac854ee2ceb724194d86e4f831c7ac651d4688e1ea82790af8adbde776100aff5f2ce0aaeec0b35f69378abe04d28c0495c59fb31585

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3914081.exe
        Filesize

        145KB

        MD5

        d3b694ac661c32226b4bf2ea26ca1fbc

        SHA1

        bc9133de937161f4ebdebac3a7371cdcc044314c

        SHA256

        99059cb2b6dc4237b0d65eaa2cf64d14dd776ef84a372578f49b803c24bfd344

        SHA512

        9b04ac0beeffcc179753a6a418932d28c0dfa1118ecad99ebbdabddd4d67ac545aa930df17b75839d51acab3f6c7007a3e2695aaff802859e7411d9eb2130e59

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3914081.exe
        Filesize

        145KB

        MD5

        d3b694ac661c32226b4bf2ea26ca1fbc

        SHA1

        bc9133de937161f4ebdebac3a7371cdcc044314c

        SHA256

        99059cb2b6dc4237b0d65eaa2cf64d14dd776ef84a372578f49b803c24bfd344

        SHA512

        9b04ac0beeffcc179753a6a418932d28c0dfa1118ecad99ebbdabddd4d67ac545aa930df17b75839d51acab3f6c7007a3e2695aaff802859e7411d9eb2130e59

      • memory/1408-209-0x0000000007A40000-0x0000000007A50000-memory.dmp
        Filesize

        64KB

      • memory/1408-206-0x0000000000C40000-0x0000000000D36000-memory.dmp
        Filesize

        984KB

      • memory/1436-207-0x0000000005720000-0x0000000005D38000-memory.dmp
        Filesize

        6.1MB

      • memory/1436-199-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/1436-222-0x0000000007270000-0x000000000779C000-memory.dmp
        Filesize

        5.2MB

      • memory/1436-221-0x0000000006B70000-0x0000000006D32000-memory.dmp
        Filesize

        1.8MB

      • memory/1436-220-0x0000000006280000-0x00000000062D0000-memory.dmp
        Filesize

        320KB

      • memory/1436-219-0x0000000006200000-0x0000000006276000-memory.dmp
        Filesize

        472KB

      • memory/1436-217-0x0000000005DE0000-0x0000000005E46000-memory.dmp
        Filesize

        408KB

      • memory/1436-216-0x0000000005D40000-0x0000000005DD2000-memory.dmp
        Filesize

        584KB

      • memory/1436-212-0x0000000005240000-0x0000000005250000-memory.dmp
        Filesize

        64KB

      • memory/1436-211-0x0000000005250000-0x000000000528C000-memory.dmp
        Filesize

        240KB

      • memory/1436-210-0x00000000051D0000-0x00000000051E2000-memory.dmp
        Filesize

        72KB

      • memory/1436-208-0x00000000052A0000-0x00000000053AA000-memory.dmp
        Filesize

        1.0MB

      • memory/1688-188-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-171-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-167-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-165-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-175-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-177-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-169-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-163-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-161-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-159-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-158-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-157-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-156-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-179-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-155-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-173-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-187-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-186-0x0000000004A10000-0x0000000004A20000-memory.dmp
        Filesize

        64KB

      • memory/1688-181-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-154-0x0000000004A20000-0x0000000004FC4000-memory.dmp
        Filesize

        5.6MB

      • memory/1688-185-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/1688-183-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3288-218-0x0000000000350000-0x0000000000350000-memory.dmp
      • memory/3288-213-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/3364-198-0x0000000007970000-0x0000000007980000-memory.dmp
        Filesize

        64KB

      • memory/3364-197-0x0000000000B10000-0x0000000000BF8000-memory.dmp
        Filesize

        928KB

      • memory/3960-193-0x0000000000300000-0x000000000032A000-memory.dmp
        Filesize

        168KB